Sciweavers

1701 search results - page 31 / 341
» Computer Science and State Machines
Sort
View
DSN
2011
IEEE
13 years 9 months ago
Analysis of security data from a large computing organization
In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...
ICONFERENCE
2011
14 years 4 months ago
A vision for information visualization in information science
This paper presents the case for Information Visualization (IV) to be a central, integrated component of study in Information Science. We summarize the current state of IV within ...
Marilyn Ostergren, Jeff Hemsley, Miranda Belarde-L...
HUC
1999
Springer
15 years 2 months ago
The Children's Machines: Handheld and Wearable Computers Too
In this paper we describe the material of a construction kit designed to allow children to build their own handheld and wearable devices to meet their interests and passions. Child...
Bakhtiar Mikhak, Fred Martin, Mitchel Resnick, Rob...
SBRN
1998
IEEE
15 years 2 months ago
Implementation of a Probabilistic Neural Network for Multi-spectral Image Classification on an FPGA based Custom Computing Machi
As the demand for higher performance computers for the processing of remote sensing science algorithms increases, the need to investigate new computing paradigms is justified. Fie...
Marco A. Figueiredo, Clay Gloster
ACSAC
2003
IEEE
15 years 3 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt